Warning: Permanently added '10.128.1.144' (ED25519) to the list of known hosts. 2024/11/25 02:33:35 ignoring optional flag "sandboxArg"="0" 2024/11/25 02:33:35 parsed 1 programs [ 51.338731][ T28] kauditd_printk_skb: 32 callbacks suppressed [ 51.338746][ T28] audit: type=1400 audit(1732502016.436:108): avc: denied { unlink } for pid=409 comm="syz-executor" name="swap-file" dev="sda1" ino=1929 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 51.373988][ T409] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 51.856253][ T422] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.863141][ T422] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.870520][ T422] device bridge_slave_0 entered promiscuous mode [ 51.877159][ T422] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.884265][ T422] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.891509][ T422] device bridge_slave_1 entered promiscuous mode [ 51.941588][ T422] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.948460][ T422] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.955533][ T422] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.962360][ T422] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.984282][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.991471][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.999608][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 52.006858][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 52.015998][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.024134][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.031082][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.040773][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.048816][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.055650][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.068074][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 52.077244][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 52.092397][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 52.103665][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 52.111673][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 52.118965][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 52.127848][ T422] device veth0_vlan entered promiscuous mode [ 52.138252][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 52.147240][ T422] device veth1_macvtap entered promiscuous mode [ 52.156724][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 52.169795][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 52.717936][ T28] audit: type=1401 audit(1732502017.806:109): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" 2024/11/25 02:33:37 executed programs: 0 [ 52.837338][ T473] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.844345][ T473] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.851807][ T473] device bridge_slave_0 entered promiscuous mode [ 52.858577][ T473] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.865409][ T473] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.872996][ T473] device bridge_slave_1 entered promiscuous mode [ 52.943380][ T427] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 52.950638][ T427] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 52.959540][ T427] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 52.967664][ T427] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.975908][ T427] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.982778][ T427] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.991924][ T427] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.999443][ T427] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.007538][ T427] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.015878][ T427] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.022741][ T427] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.037388][ T427] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 53.046871][ T427] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 53.061538][ T427] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 53.072720][ T427] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 53.080895][ T427] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 53.088166][ T427] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 53.096529][ T43] device bridge_slave_1 left promiscuous mode [ 53.102681][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.110082][ T43] device bridge_slave_0 left promiscuous mode [ 53.115999][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.124168][ T43] device veth1_macvtap left promiscuous mode [ 53.130057][ T43] device veth0_vlan left promiscuous mode [ 53.245211][ T473] device veth0_vlan entered promiscuous mode [ 53.258331][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 53.267960][ T473] device veth1_macvtap entered promiscuous mode [ 53.279229][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 53.287708][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 53.309789][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 53.324758][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 53.344443][ T479] loop2: detected capacity change from 0 to 512 [ 53.353550][ T479] ======================================================= [ 53.353550][ T479] WARNING: The mand mount option has been deprecated and [ 53.353550][ T479] and is ignored by this kernel. Remove the mand [ 53.353550][ T479] option from the mount to silence this warning. [ 53.353550][ T479] ======================================================= [ 53.388721][ T479] EXT4-fs: Ignoring removed orlov option [ 53.394293][ T479] EXT4-fs: Ignoring removed nomblk_io_submit option [ 53.403186][ T479] EXT4-fs error (device loop2): ext4_orphan_get:1396: inode #17: comm syz.2.15: iget: bogus i_mode (0) [ 53.414600][ T479] EXT4-fs error (device loop2): ext4_orphan_get:1401: comm syz.2.15: couldn't read orphan inode 17 (err -117) [ 53.426321][ T479] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 53.435381][ T28] audit: type=1400 audit(1732502018.526:110): avc: denied { mount } for pid=478 comm="syz.2.15" name="/" dev="loop2" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 53.456747][ T28] audit: type=1400 audit(1732502018.526:111): avc: denied { read write } for pid=478 comm="syz.2.15" name="fuse" dev="devtmpfs" ino=93 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 53.479980][ T28] audit: type=1400 audit(1732502018.526:112): avc: denied { open } for pid=478 comm="syz.2.15" path="/dev/fuse" dev="devtmpfs" ino=93 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 53.489124][ T479] general protection fault, probably for non-canonical address 0xdffffc0000000003: 0000 [#1] PREEMPT SMP KASAN [ 53.503333][ T28] audit: type=1400 audit(1732502018.526:113): avc: denied { mounton } for pid=478 comm="syz.2.15" path="/0/bus/file0" dev="loop2" ino=12 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 53.514201][ T479] KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f] [ 53.514218][ T479] CPU: 0 PID: 479 Comm: syz.2.15 Not tainted 6.1.112-syzkaller-1151978-g226e9f92a06c #0 [ 53.514238][ T479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 53.514249][ T479] RIP: 0010:filename_create+0x2d8/0x530 [ 53.514288][ T479] Code: 92 00 00 00 4c 89 7c 24 28 45 84 e4 0f 95 c0 83 7c 24 14 00 0f 94 c3 20 c3 4c 89 f0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 0f 85 1f 02 00 00 45 8b 26 41 bd 00 00 70 00 be [ 53.514304][ T479] RSP: 0018:ffffc90000a17cc0 EFLAGS: 00010206 [ 53.595004][ T479] RAX: 0000000000000003 RBX: 1ffff92000142f00 RCX: dffffc0000000000 [ 53.602804][ T479] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000000 [ 53.610792][ T479] RBP: ffffc90000a17db0 R08: ffffffff81cc34e8 R09: fffff52000142f71 [ 53.618687][ T479] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 [ 53.626500][ T479] R13: 0000000000000600 R14: 0000000000000018 R15: ffffc90000a17e60 [ 53.634311][ T479] FS: 00007f8ddc1646c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 53.643079][ T479] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 53.649498][ T479] CR2: 000000002000a000 CR3: 0000000122ea0000 CR4: 00000000003506b0 [ 53.657312][ T479] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 53.665145][ T479] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 53.672940][ T479] Call Trace: [ 53.676058][ T479] [ 53.678854][ T479] ? __die_body+0x62/0xb0 [ 53.683003][ T479] ? die_addr+0x9f/0xd0 [ 53.687002][ T479] ? exc_general_protection+0x317/0x4c0 [ 53.692380][ T479] ? asm_exc_general_protection+0x27/0x30 [ 53.697930][ T479] ? fast_dput+0x78/0x2a0 [ 53.702098][ T479] ? filename_create+0x2d8/0x530 [ 53.706870][ T479] ? kern_path_create+0x1a0/0x1a0 [ 53.711821][ T479] do_mknodat+0x1a4/0x5c0 [ 53.715983][ T479] ? strncpy_from_user+0x169/0x2b0 [ 53.720930][ T479] ? do_o_path+0x230/0x230 [ 53.725184][ T479] ? getname_flags+0x1fd/0x520 [ 53.729781][ T479] __x64_sys_mknod+0x8e/0xa0 [ 53.734221][ T479] x64_sys_call+0x3cb/0x9a0 [ 53.738549][ T479] do_syscall_64+0x3b/0xb0 [ 53.742799][ T479] ? clear_bhb_loop+0x55/0xb0 [ 53.747401][ T479] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 53.753129][ T479] RIP: 0033:0x7f8ddb37e719 [ 53.757384][ T479] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 53.777018][ T479] RSP: 002b:00007f8ddc164038 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 53.785263][ T479] RAX: ffffffffffffffda RBX: 00007f8ddb535f80 RCX: 00007f8ddb37e719 [ 53.793073][ T479] RDX: 0000000000000704 RSI: 0000000000000000 RDI: 00000000200002c0 [ 53.800995][ T479] RBP: 00007f8ddb3f139e R08: 0000000000000000 R09: 0000000000000000 [ 53.808799][ T479] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 53.816603][ T479] R13: 0000000000000000 R14: 00007f8ddb535f80 R15: 00007ffd21202698 [ 53.824679][ T479] [ 53.827529][ T479] Modules linked in: [ 53.841701][ T479] ---[ end trace 0000000000000000 ]--- [ 53.847128][ T479] RIP: 0010:filename_create+0x2d8/0x530 [ 53.852712][ T479] Code: 92 00 00 00 4c 89 7c 24 28 45 84 e4 0f 95 c0 83 7c 24 14 00 0f 94 c3 20 c3 4c 89 f0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 0f 85 1f 02 00 00 45 8b 26 41 bd 00 00 70 00 be [ 53.872397][ T479] RSP: 0018:ffffc90000a17cc0 EFLAGS: 00010206 [ 53.878584][ T479] RAX: 0000000000000003 RBX: 1ffff92000142f00 RCX: dffffc0000000000 [ 53.886440][ T479] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000000 [ 53.894251][ T479] RBP: ffffc90000a17db0 R08: ffffffff81cc34e8 R09: fffff52000142f71 [ 53.902074][ T479] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 [ 53.909871][ T479] R13: 0000000000000600 R14: 0000000000000018 R15: ffffc90000a17e60 [ 53.910580][ T28] audit: type=1400 audit(1732502019.006:114): avc: denied { append } for pid=84 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 53.917669][ T479] FS: 00007f8ddc1646c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 53.939835][ T28] audit: type=1400 audit(1732502019.006:115): avc: denied { open } for pid=84 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 53.970632][ T28] audit: type=1400 audit(1732502019.006:116): avc: denied { getattr } for pid=84 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 53.972710][ T479] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 53.999875][ T479] CR2: 000000002000a000 CR3: 0000000122ea0000 CR4: 00000000003506b0 [ 54.007750][ T479] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 54.015914][ T479] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 54.024019][ T479] Kernel panic - not syncing: Fatal exception [ 54.030285][ T479] Kernel Offset: disabled [ 54.034431][ T479] Rebooting in 86400 seconds..